PDA

View Full Version : nt!NtMapUserPhysicalPages and Kernel Stack-Spraying Techniques


j00ru vx tech blog
May 29th, 2011, 12:33
Although not the most common vulnerability class, it sometimes happens that a ring-0 module (or the kernel itself) references a local variable or buffer, which wasn’t previously properly initialized. The threat is usually mitigated by compiler warnings / errors, informing about potential security flaws present in the source code – as life shows, it is [...]

http://j00ru.vexillium.org/?p=769